• 제목/요약/키워드: smartphone security technology

검색결과 117건 처리시간 0.022초

사용자의 PC와 스마트폰에 대한 정보보안 인식 차이에 관한 연구 (The Study on the Difference of Information Security Awareness between PC and Smartphone)

  • 박정현;강성민
    • 경영정보학연구
    • /
    • 제19권3호
    • /
    • pp.69-89
    • /
    • 2017
  • 정보화 시대에서 사람들은 정보기술이 빠른 속도로 발전하여 편리하고 체계적인 생활을 체험하고 있지만 정보보안 이슈들로 인하여 다양한 피해도 많이 경험하고 있다. 특히 스마트폰은 새로운 단말기로서 PC와 같이 정보보안 이슈에 있어 최근에 크게 화두가 되고 있으며, 이러한 환경에서 사용자의 PC 및 스마트폰 정보보안에 대한 인식을 분석할 필요가 있다. 즉, 어떠한 요인이 정보보안 인식에 영향을 미치고 또한 어떠한 요인에서 PC 및 스마트폰 간의 차이가 있는지를 분석하고자 한다. 하지만 스마트폰 정보보안 인식에 대한 연구 및 PC와 스마트폰 정보보안 인식의 차이에 대한 기존의 연구는 찾아보기가 어렵다. 본 연구는 이러한 부분에 중점을 두고 선행연구에 기반한 연구 모델을 제시하였고 실증적 검증을 수행하였다. 본 연구의 결과를 요약하면 다음과 같다. 첫째, 보안 기술의 이해도, 정보보안 위협의 이해도, 정보보안 교육이 사용자의 PC 및 스마트폰 정보보안 인식에 긍정적인 영향을 미친다는 것을 검증하였다. 정보보안 의도는 사용자의 PC 정보보안 인식에 영향을 끼치고 스마트폰 정보보안 인식에는 영향을 끼치지 않는 것으로 나타났다. 또한, 정보보안 정책은 사용자의 PC 및 스마트폰 정보보안 인식에 영향을 미치지 않았다. 둘째, 사용자의 PC 및 스마트폰 정보보안 인식이 차이가 있음을 검증하지 못했다. 하지만 각 요인별 차이를 살펴보게 되면 보안 기술의 이해도, 정보보안 정책 및 정보보안 교육 3가지 측면에서 PC와 스마트폰 간의 차이가 있음을 검증할 수 있었고 정보보안 위협의 이해도와 정보보안 의도 측면에서 보면 PC와 스마트폰의 차이가 있음을 검증할 수 없었다.

A Consecutive Motion and Situation Recognition Mechanism to Detect a Vulnerable Condition Based on Android Smartphone

  • Choi, Hoan-Suk;Lee, Gyu Myoung;Rhee, Woo-Seop
    • International Journal of Contents
    • /
    • 제16권3호
    • /
    • pp.1-17
    • /
    • 2020
  • Human motion recognition is essential for user-centric services such as surveillance-based security, elderly condition monitoring, exercise tracking, daily calories expend analysis, etc. It is typically based on the movement data analysis such as the acceleration and angular velocity of a target user. The existing motion recognition studies are only intended to measure the basic information (e.g., user's stride, number of steps, speed) or to recognize single motion (e.g., sitting, running, walking). Thus, a new mechanism is required to identify the transition of single motions for assessing a user's consecutive motion more accurately as well as recognizing the user's body and surrounding situations arising from the motion. Thus, in this paper, we collect the human movement data through Android smartphones in real time for five targeting single motions and propose a mechanism to recognize a consecutive motion including transitions among various motions and an occurred situation, with the state transition model to check if a vulnerable (life-threatening) condition, especially for the elderly, has occurred or not. Through implementation and experiments, we demonstrate that the proposed mechanism recognizes a consecutive motion and a user's situation accurately and quickly. As a result of the recognition experiment about mix sequence likened to daily motion, the proposed adoptive weighting method showed 4% (Holding time=15 sec), 88% (30 sec), 6.5% (60 sec) improvements compared to static method.

모바일 패션 쇼핑 특성과 지각된 상호작용성, 지각된 유용성이 구매의도에 미치는 영향 (Effects of mobile fashion shopping characteristics, perceived interactivity, and perceived usefulness on purchase intention)

  • 김민정;신수연
    • 복식문화연구
    • /
    • 제23권2호
    • /
    • pp.228-241
    • /
    • 2015
  • The purpose of this study was to verify the effect of mobile fashion shopping characteristics and perceived interactivity on perceived usefulness, and the effect of perceived usefulness on purchase attitude and purchase intention based on TAM (Technology Acceptance Model). We conducted the survey targeting smartphone users in their 20s~30s living in Seoul and metropolitan area. Among 483 data collected, we used 452 samples except 31 unreliable respondents for the analysis. To analyze the structural equation model, we did factor analysis, reliability analysis, and structural equation model analysis using SPSS 18.0 and AMOS 16.0. The results were as follows: We confirmed 5 mobile fashion shopping characteristics (enjoyment, credibility, instant connectivity, security, and personalization) and 3 perceived interactivity factors (control, responsiveness and two-way communication, and contextual offer) as results of confirmative factor analysis. Mobile fashion shopping characteristics and perceived interactivity had positive effects on perceived usefulness. Mobile fashion shopping characteristics affected perceived interactivity and also had indirect effect on perceived usefulness via perceived interactivity. In other words, mobile fashion shopping characteristics had direct and indirect effect on perceived usefulness. Perceived usefulness influenced purchase attitude and purchase attitude influenced purchase intention. Perceived usefulness had direct effect on purchase intention and the indirect effect through purchase attitude was significant.

An image analysis system Design using Arduino sensor and feature point extraction algorithm to prevent intrusion

  • LIM, Myung-Jae;JUNG, Dong-Kun;KWON, Young-Man
    • 한국인공지능학회지
    • /
    • 제9권2호
    • /
    • pp.23-28
    • /
    • 2021
  • In this paper, we studied a system that can efficiently build security management for single-person households using Arduino, ESP32-CAM and PIR sensors, and proposed an Android app with an internet connection. The ESP32-CAM is an Arduino compatible board that supports both Wi-Fi, Bluetooth, and cameras using an ESP32-based processor. The PCB on-board antenna may be used independently, and the sensitivity may be expanded by separately connecting the external antenna. This system has implemented an Arduino-based Unauthorized intrusion system that can significantly help prevent crimes in single-person households using the combination of PIR sensors, Arduino devices, and smartphones. unauthorized intrusion system, showing the connection between Arduino Uno and ESP32-CAM and with smartphone applications. Recently, if daily quarantine is underway around us and it is necessary to verify the identity of visitors, it is expected that it will help maintain a safety net if this system is applied for the purpose of facial recognition and restricting some access. This technology is widely used to verify that the characters in the two images entered into the system are the same or to determine who the characters in the images are most similar to among those previously stored in the internal database. There is an advantage that it may be implemented in a low-power, low-cost environment through image recognition, comparison, feature point extraction, and comparison.

가시광통신체계에서 난반사 조명을 고려한 인코딩 스킴 (An Encoding Scheme Considering Diffused Lights In a Visual Light Communication System)

  • 은성배;김동규;차신
    • 한국멀티미디어학회논문지
    • /
    • 제22권2호
    • /
    • pp.186-193
    • /
    • 2019
  • Visible light communication technology is being studied and developed in various ways due to advantages such as high transmission speed, excellent positioning and higher security. However, existing visible light communication systems have difficulties in entering the market because they use special transmitters and receivers. We will overcome the difficulty if we develope a VLC system that uses a conventional LED light as a transmitter and a smartphone camera as a receiver. What matters is that LED lights include a scatter filter to prevent glareness for human eyes, but the existing VLC(Visual Light Communication) method can not be applied. In this paper, we propose a method to encode data with On / Off patterns of LEDs in the lighting with $M{\times}N$ LEDs. We defined parameters like L-off-able and K-seperated to facilitate the recognition of On / Off patterns in the diffused Lights. We conducted experiments using an LED lighting and smart phones to determine the parameter values. Also, the maximum transmission rate of our encoding technique is mathematically presented. Our encoding scheme can be applied to indoor and outdoor positioning applications or settlement of commercial transactions.

Evolution of PKI Internet Banking in Korea

  • Park, Seungchul
    • International journal of advanced smart convergence
    • /
    • 제8권1호
    • /
    • pp.44-57
    • /
    • 2019
  • Most banks in Korea have provided Internet banking services based on PKI(Public Key Infrastructure) certificates since the early 2000s when Internet banking began in Korea. To support PKI Internet banking, the Korean government backed the electronic signature law and supported the rapid spread of PKI-based Internet banking by regulating the application of PKI certificates to be compulsory in Internet banking until 2015. PKI Internet Banking in Korea has been developed as a pioneer in this field through many challenges and responses until its present success. Korea's PKI banking, which started with soft-token-based closed banking, has responded to various types of cyber attack attempts and promoted the transition to open banking by accepting various criticisms due to lack of compatibility with international standards. In order to improve the convenience and security of PKI Internet banking, various attempts have been made, such as biometric-integrated smartphone-based PKI authentication. In this paper, we primarily aim to share the experience and lessons of PKI banking by analyzing the evolution process of PKI Internet banking in Korea. It also has the purpose of presenting the challenges of Korea's PKI Internet banking and sharing its development vision.

Shuffling of Elliptic Curve Cryptography Key on Device Payment

  • Kennedy, Chinyere Grace;Cho, Dongsub
    • 한국멀티미디어학회논문지
    • /
    • 제22권4호
    • /
    • pp.463-471
    • /
    • 2019
  • The growth of mobile technology particularly smartphone applications such as ticketing, access control, and making payments are on the increase. Elliptic Curve Cryptography (ECC)-based systems have also become widely available in the market offering various convenient services by bringing smartphones in proximity to ECC-enabled objects. When a system user attempts to establish a connection, the AIK sends hashes to a server that then verifies the values. ECC can be used with various operating systems in conjunction with other technologies such as biometric verification systems, smart cards, anti-virus programs, and firewalls. The use of Elliptic-curve cryptography ensures efficient verification and signing of security status verification reports which allows the system to take advantage of Trusted Computing Technologies. This paper proposes a device payment method based on ECC and Shuffling based on distributed key exchange. Our study focuses on the secure and efficient implementation of ECC in payment device. This novel approach is well secure against intruders and will prevent the unauthorized extraction of information from communication. It converts plaintext into ASCII value that leads to the point of curve, then after, it performs shuffling to encrypt and decrypt the data to generate secret shared key used by both sender and receiver.

An Explainable Deep Learning-Based Classification Method for Facial Image Quality Assessment

  • Kuldeep Gurjar;Surjeet Kumar;Arnav Bhavsar;Kotiba Hamad;Yang-Sae Moon;Dae Ho Yoon
    • Journal of Information Processing Systems
    • /
    • 제20권4호
    • /
    • pp.558-573
    • /
    • 2024
  • Considering factors such as illumination, camera quality variations, and background-specific variations, identifying a face using a smartphone-based facial image capture application is challenging. Face Image Quality Assessment refers to the process of taking a face image as input and producing some form of "quality" estimate as an output. Typically, quality assessment techniques use deep learning methods to categorize images. The models used in deep learning are shown as black boxes. This raises the question of the trustworthiness of the models. Several explainability techniques have gained importance in building this trust. Explainability techniques provide visual evidence of the active regions within an image on which the deep learning model makes a prediction. Here, we developed a technique for reliable prediction of facial images before medical analysis and security operations. A combination of gradient-weighted class activation mapping and local interpretable model-agnostic explanations were used to explain the model. This approach has been implemented in the preselection of facial images for skin feature extraction, which is important in critical medical science applications. We demonstrate that the use of combined explanations provides better visual explanations for the model, where both the saliency map and perturbation-based explainability techniques verify predictions.

군사기밀 유출 사례 분석을 통한 군 내부정보 유출 방지 방안 : 내부자 행위 중심으로 (Measures to Prevent the Leakage of Military Internal Information through the Analysis of Military Secret Leakage Cases: Focusing on Insider Behaviors)

  • 엄정호;김남욱
    • 융합보안논문지
    • /
    • 제20권1호
    • /
    • pp.85-92
    • /
    • 2020
  • 최근에 발생한 군사기밀 유출 사례 중에는 정보통신망을 이용한 내부정보 유출은 드물다. 그 이유는 군 업무 특성상 국방정보통신망은 자료 전송용 인터넷과 내부 업무용 인트라넷으로 구성되어 있는데 물리적으로 분리되어 있고, 인터넷망을 통해서 자료를 송·수신할 때는 까다로운 절차를 거치게 때문이다. 최근 군사기밀 유출 사례를 분석한 결과 대부분의 유출 경로는 비밀을 복사하여 넘겨주거나 스마트폰으로 촬영하여 전송하거나 기밀 내용을 기억한 후에 발설한 것이다. 그래서 정보통신망을 대상으로 한 군사기밀 유출 차단 또는 탐지하는 기술은 효과적이지 못하다. 본 연구에서는 유출 대상인 군사기밀이 아닌 유출 주체자인 내부자 행위에 중점을 두고 정보유출 방지 방안을 제안하고자 한다. 첫 번째는 군사기밀을 유출하는 행위를 차단하는 예방 대책이고 두 번째는 군사기밀 파일에 의심스러운 접근행위를 차단하는 방안이며, 마지막으로 내부자의 정보유출 행위를 탐지하는 방안이다.

시청자의 TV 이용 행태를 고려한 디지털 TV 데이터 서비스의 기획 가이드라인과 이를 적용한 데이터 서비스 프로토타입 (A Viewer's Modality-based Design Guideline of Digital TV Data Service and a Data Service Prototype adopting the Guideline)

  • 고광일
    • 융합보안논문지
    • /
    • 제12권3호
    • /
    • pp.123-129
    • /
    • 2012
  • 디지털 기술의 발달로 TV, PC, 스마트폰, 그리고 패드(Pad)류 컴퓨터 등의 기기들이 인터넷으로 상호 연결되는 추세에 맞추어 인터넷 서비스들이 특정 기기에 한정되지 않고 다양한 기기를 대상으로 구현되는 "N-스크린화" 양상을 보이고 있다. 디지털 TV는 거실 엔터테인먼트의 핵심 플랫폼이면서 다양한 사용자층이 이용하기 때문에 기존 인터넷 서비스 업체들이 자사의 서비스를 디지털 TV의 데이터 서비스로 구현하여 서비스 브랜드의 제고와 서비스 고객의 층을 확대를 꾀하고 있다. 그러나 대부분의 데이터 서비스들이 소비자의 흥미를 두고 방송 영상 콘텐츠와 경쟁하는 구도를 취하고 있어서 성공적인 효과를 거두지 못하고 있다. 본 논문은 방송 영상 콘텐츠의 시청이 시청자의 주된 TV 이용 행태라는 점을 고려한 디지털 TV의 데이터 서비스 설계 가이드라인을 제안하고 이 가이드라인이 적용된 "TV 이상형 월드컵"이란 데이터 서비스의 프로토타입을 소개한다. TV 이상형 월드컵은 방송 영상과 경쟁하는 구도를 벗어나기 위해 서비스 수행 시 방송 영상 시청이 가능하며 서비스가 유지되면서 채널 변경이 가능하고 수 분 안에 서비스의 목적이 달성 되는 서비스 동선을 갖추고 있다.